summaryrefslogtreecommitdiff
path: root/src/regress/lib/libc/stdio_threading/fopen (unfollow)
Commit message (Collapse)AuthorFilesLines
7 daysmove the sentence about X509_VERIFY_PARAM_get_hostflags(3)schwarze1-6/+7
to the right section and mention the value returned if X509_VERIFY_PARAM_set_hostflags(3) was never called; OK tb@ kenjiro@
7 daysUse 64 bit BN_ULONG on 64 bit Windows platforms.jsing1-2/+2
64 bit Windows is a special LLP snowflake and it is currently incorrectly using 32 bit BN_ULONG, since _LP64 is not defined. Enable 64 bit BN_ULONG if _LP64 or _WIN64 is defined. ok tb@
8 daystweak previous: "functions returns" -> "functions return"schwarze1-4/+4
and add a missing Oxford comma
8 daysLet this compile on m88k.miod1-1/+3
8 daysUse BN_ULONG in probable_prime_dh()tb1-2/+2
This was the last user of BN_LONG in code. It had no reason to do so. BN_mod_word() returns a BN_ULONG and since the largest prime in the small primes table primes[] is well below 20000, the only return value that could cause 'mod' to be negative was the error sentinel (BN_ULONG)-1. ok jsing kenjiro
9 daysUse more specific types for BN.jsing1-27/+29
Be specific about width and use uint64_t/uint32_t, rather than using unsigned int/long/long long, based on platform. Additionally use UINT64_C() and UINT32_C() for constants, along with PRI*64/PRI*32 for formatting. This makes the platform responsible for providing the correct types/defines - all we then need to do is determine is if BN should use a 32 bit or 64 bit configuration. With input from and ok tb@
9 daysAvoid the use of _LP64 in libcrypto regress.jsing1-2/+2
What the tests actually care about is the size of a BN_ULONG, hence condition on BN_BYTES instead. Discussed with tb@
11 daysIn nref_nos() don't leak the ASN1_INTEGER if the push failstb1-2/+4
(A much bigger problem here is a double free for which I will send out a diff shortly) From Niels Dossche
11 daysx509_cpols: pass correct free function to sk_ASN1_INTEGER_free()tb1-2/+2
from Niels Dossche
11 daysx509_cpols: indent labels to make diffs more readabletb1-8/+8
11 daysPlug memeory leak in CMS_EncryptedData_encrypt()tb1-2/+4
If CMS_EncryptedData_set1_key() fails, cms is leaked. From Niels Dossche
12 daysec_curve: Remove outdated creditstb1-4/+1
14 daysNeeds <sys/param.h> for hppa.miod1-3/+3
2025-10-27des_key: add missing hyphen in semi-weak keystb1-2/+2
From Thorsten Blum
2025-10-26This test takes *days* to complete on older platforms, reduce the loop countmiod1-2/+8
for them.
2025-10-25Simplify tls13_server_hello_build()tb1-5/+5
There's no need to pass in the hrr parameter as it is redundant with the tls13.hrr flag. This avoids boolean blindness in the caller and removes a leftover from before we had tls13.hrr. ok jsing kenjiro
2025-10-24Add missing Nm line for SSL_SESSION_duptb1-2/+3
2025-10-24Add some regress coverage for SSL_SESSION_dup()tb1-2/+22
ok kenjiro
2025-10-24The ssl_verify_param.c test can now link dynamically against libcryptotb1-3/+1
2025-10-24Use X509_VERIFY_PARAM_get_hostflags() prototype from x509_vfy.htb1-3/+2
2025-10-24bump lib{crypto,ssl,tls} minors after symbol additiontb3-3/+3
2025-10-24Document SSL_SESSION_dup(3)tb1-3/+20
ok kenjiro
2025-10-24Provide SSL_SESSION_dup()tb4-3/+13
As reported by ajacoutot and sthen, an update to net/neon is blocked on that missing symbol. ok kenjiro
2025-10-24Document X509_VERIFY_PARAM_set_hostflags(3)tb1-2/+15
ok kenjiro
2025-10-24Expose X509_VERIFY_PARAM_get_hostflags()tb4-4/+7
This is needed by Python 3.14, extending the urllib3 nonsense further. This is a trivial getter and it is exercised by the libssl unit test I added for urllib3 (which can now use dynamic linking for libcrypto). Fixes https://github.com/libressl/portable/issues/1202 Thanks to @orbea for the report. ok kenjiro PS: X509_VERIFY_PARAM_get_flags() and X509_VERIFY_PARAM_get_peername() aren't const correct. Fixing this will require some doing...
2025-10-24Implement ffsl() and ffsll() using the compiler builtin __builtin_ctzlclaudio4-11/+66
now that all archs use at least gcc4. ffsl() and ffsll() are now part of POSIX. OK deraadt@, input from miod@ and jsg@
2025-10-24libssl: const correct the ssl_session_dup() helpertb2-5/+5
This allows a const correct SSL_SESSION_dup() implementation at the cost of casting away const due to the const incorrect CRYPTO_dup_ex_data()... (I should look into fixing that, but things like rust-openssl make that hard at this point in the release cycle.) ok kenjiro (as part of a larger diff)
2025-10-23Prepare for gcc 3 leaving the building, COMPILER_VERSION can no longer getmiod1-4/+4
set to "gcc3".
2025-10-23Revert r1.286 now that all supported platforms have __builtin_clz.miod1-20/+1
2025-10-20Give this test a chance to pass on 32-bit platforms.miod1-1/+2
2025-10-16Ensure that we specify the correct group when creating a HelloRetryRequest.jsing2-9/+4
When processing the client supported groups and key shares extensions, the group selection is currently based on client preference. However, when building a HRR the preferred group is identified by calling tls1_get_supported_group(). If SSL_OP_CIPHER_SERVER_PREFERENCE is enabled, group selection will be based on server instead of client preference. This in turn can result in the server sending a HRR for a group that the client has already provided a key share for, violating the RFC. Avoid this issue by storing the client preferred group when processing the key share extension, then using this group when creating the HRR. Thanks to dzwdz for identifying and reporting the issue. ok beck@ tb@
2025-10-11use strtonum() instead of atoi(), and error out for bad numbersderaadt1-2/+7
This generates a host-order number, so the ntohs() for getservbyport() was wrong, that should always have been htons(). The transform is the same, but misleading. ok tb
2025-10-10const correct X509_VERIFY_PARAM_get_hostflags()tb2-4/+4
This is currently an internal helper only used by a regress test. We'll have to expose in the public API for Python 3.14: https://github.com/libressl/portable/issues/1202
2025-10-10Remove unused sequence member from x509_revoked_sttb2-11/+2
To allow binary search for looking up if a cert was revoked in a CRL, the list of revoked serial numbers is sorted in crl_lookup(). On the other hand, to be able to output the DER that was actually signed by the issuer, the original order needs to be remembered. Before the encoding was cached, there was a mechanism that would restore the original order on serialization using the .sequence member. This was done without a lock and was thus racy (hilarity would ensue if one thread performed a CRL lookup while another thread serialized the same CRL). When the racy mechanism was removed in 2004, the only reader of .sequence, X509_REVOKED_seq_cmp(), was also removed, and this piece of dead code was left behind. Garbage collect it. ok kenjiro
2025-10-07Revert previous. Let's deal with it when the portable release is out.tb1-7/+3
2025-10-07test framework: allow overriding the "/tmp/" directorytb1-3/+7
Windows is super picky when it comes to paths, so it needs some special massaging. Will let us avoid a patch or hack in portable.
2025-09-30cms: fix incorrect length check in kek_unwrap_key()tb1-2/+2
An incorrect length check can result in a 4-byte overwrite and an 8-byte overread. From Stanislav Fort and Viktor Dukhovni via OpenSSL. CVE-2025-9230. ok jsing
2025-09-30cms_RecipientInfo_pwri_crypt: fix incorrect return checktb1-3/+3
ok jsing
2025-09-30cms_RecipientInfo_pwri_crypt: plug leak of kekalgtb1-3/+3
ok jsing
2025-09-29libcrypto: rsa gen: min. distance between p and qjan1-3/+19
This is required in NIST Special Publication 800-56B Revision 2 "Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography": 6 RSA Key Pairs 6.2 Criteria for RSA Key Pairs for Key Establishment 6.2.1 Definition of a Key Pair 3. The prime factors p and q shall be generated using one of the methods specified in Appendix B.3 of FIPS 186 such that: c. |p – q| > 2nBits/2−100 ok djm@, tb@
2025-09-28Bump libressl version to 4.2.0tb1-3/+3
The version check will break the rust-openssl regress unless you have rust-openssl-tests-20250927p0.
2025-09-28Revert NULL,0 -> OPENSSL_FILE,OPENSSL_LINE from r1.78tb1-9/+9
This wasn't part of the initial proposal and causes issues in curl downstream. We could pile more hacks on top of this, but at some point this is getting too silly. Relatedly, most of the FOOerr() could be removed, although PEMerr(), RSAerr() and SSLerr() are used by some downstreams and probably not worth patching out. Discussed with @vszakats in https://github.com/libressl/portable/issues/1154
2025-09-17ec_asn1_test: add an example using BLS12-377tb1-1/+80
This exercises the cofactor guessing code with a large cofactor. Thanks to Daniel Bleichenbacher for pointing out this example. This contains a hack to use a bogus OID since this curve has none.
2025-09-16wycheproof: provide PBKDF2 test harnesstb1-2/+58
Skip the tests for now since they increase the test's runtime by ~50%. A later commit will gate these tests behind REGRESS_SKIP_SLOW.
2025-09-16mlkem_generate_key_external_entropy: normalize sizeof() usetb1-2/+2
2025-09-16Simplify MLKEM_{private,public}_key_new()tb1-19/+7
This removes two unnecessary variables in each of these functions, normalizes the sizeof() use and undoes unnecessary line wraps. ok deraadt djm kenjiro
2025-09-15wycheproof: run HMACSM3 tests against libcryptotb1-4/+7
2025-09-15aes: move explicit_bzero() after NULL checktb1-5/+7
CID 621601 621602 ok djm jsg jsing miod
2025-09-15MLKEM_private_key_new: add missing space before =tb1-2/+2
2025-09-14wycheproof: run ML-KEM test vectors against libcryptotb1-2/+139